6 week (Short term course)
2 days (workshop)
6 months (Diploma course)
1.CEH (Certified Ethical Hacker)
Exam Code-312-50
Global Appraved
Online Exam Fee:-18000-28000
Version-9
2.CHFI (Computer Hacker Forensic Investigator)
Exam Code-312-49
Approved by Ec-Council
Online Exam Fee:-18000-28000
Version-9
3.CSCU (Certified Secure Computer User)
Exam...
Saturday, December 17, 2016
Tuesday, December 13, 2016
MD5
MD5
MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual. MD5, which was developed by Professor Ronald L. Rivest of MIT,...
what is hacking
What is hacking?
There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to...
OSI MODEL
Introduction to OSI Model
— OSI model is based on the proposal developed by the
International Standards Organization (ISO).
— This model is called ISO OSI (Open Systems
Interconnection) Reference model because it deals with connecting open systems
(systems that are open...
security accounts manager
Security Accounts Manager (SAM)
In the SAM, each user account can be assigned a local area network (LAN) password and a Windows password. Both are encrypted. If someone attempts to log on to the system and the user name and associated passwords match an entry in the SAM, a sequence of events takes place ultimately allowing that person...